by gcstco | Jun 16, 2022 | Blog, News
The security industry has failed you. Epically. You keep adding security products, but it often feels like you’re on a treadmill. Running all the time but not sure whether you’re making progress. Sure, most security products will give you log files, reports, and...
by gcstco | Jun 16, 2022 | Blog, News
At first glance, it appears that data classification and Zero Trust, a cybersecurity framework, would have nothing to do with one another. After all, each has their own separate specialized function – data classification labels data based on sensitivity and Zero Trust...
by gcstco | Jun 15, 2022 | Blog, News
The automotive industry is currently undergoing one of the biggest technological transformations of any field. The advent of autonomous driving and increased connectivity is changing how automakers, automotive parts manufacturers, and supply chains operate, creating...
by gcstco | Jun 12, 2022 | Blog, News
Hacking a powered-off iPhone: vulnerabilities never sleep . Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible. Researchers from the Secure Mobile Networking Lab at the University of Darmstadt, Germany, have...
by gcstco | Jun 9, 2022 | Blog, News
2022 IT Priorities Report: Practitioners Need More Time To Innovate . In December 2021, we released the 2022 IT Priorities Report. In that report, we surveyed IT leaders around the world to document how their organizations changed in 2021 and to understand their...
by gcstco | Jun 9, 2022 | Blog, News
Alot of us here at Forcepoint look forward to the annual RSA Conference – particularly this year as it is back in person! Once again, we’ll be on the show floor in the North Expo of the Moscone Center (Booth N-5965) and on the 4th floor of the nearby St. Regis Hotel....